From 24300e8d5bc0182f85c7fdfd596be78faed907de Mon Sep 17 00:00:00 2001
From: byt3bl33d3r <byt3bl33d3r@gmail.com>
Date: Tue, 15 Jul 2014 22:51:37 +0200
Subject: [PATCH] removed a print statement

---
 mitmf.py           | 2 +-
 plugins/JavaPwn.py | 1 -
 2 files changed, 1 insertion(+), 2 deletions(-)

diff --git a/mitmf.py b/mitmf.py
index a55aadb..787a84e 100755
--- a/mitmf.py
+++ b/mitmf.py
@@ -26,7 +26,7 @@ if __name__ == "__main__":
     #add sslstrip options
     sgroup = parser.add_argument_group("sslstrip","Options for sslstrip library")
     sgroup.add_argument("-w","--write",type=argparse.FileType('w'),metavar="filename", default=sys.stdout,help="Specify file to log to (stdout by default).")
-    sgroup.add_argument("--log-level",type=str,choices=['debug','info','warning','error'],default="info",help="Specify file to log to (stdout by default).")
+    sgroup.add_argument("--log-level",type=str,choices=['debug','info'],default="info",help="Specify file to log to (stdout by default).")
     slogopts = sgroup.add_mutually_exclusive_group()   
     slogopts.add_argument("-p","--post",action="store_true",help="Log only SSL POSTs. (default)")
     slogopts.add_argument("-s","--ssl",action="store_true",help="Log all SSL traffic to and from server.")
diff --git a/plugins/JavaPwn.py b/plugins/JavaPwn.py
index 8bfed72..767ae34 100644
--- a/plugins/JavaPwn.py
+++ b/plugins/JavaPwn.py
@@ -119,7 +119,6 @@ class JavaPwn(BrowserProfiler, Plugin):
                         if len(jobs) > 0:
                             for k,v in jobs.items():
                                 info = msf.call('job.info', [k])
-                                print info
                                 if exploit in info['name']: 
                                     logging.info('%s >> \t %s exploit already started' % (vic_ip, exploit))
                                     url = info['uripath'] #get the url assigned to the exploit